Privacy‐preserving smart data storage for financial industry in cloud computing

The recent booming development of cloud computing has enabled a dramatical revolution for current enterprises to create values. Numerous benefits of utilizing cloud services are enhancing the efficiency of improving or creating new businesses. This trend is also associated with the rapid growth of the wireless networks, such as 5G. However, the great increase of deploying clouds also leads to new concerns in data security. One of the major concerns is private leakage that derives from insiders' malicious operations or attacks. This problem has raised a great restriction for financial firms to execute cloud applications. Focusing on this issue, we propose a new solution, entitled Privacy‐Preserving Smart Storage (PS2) model that targets at solving the privacy leakage problems within the existing threat models. The proposed approach uses a novel distributed data storage method to prevent financial enterprises from insiders' massive data mining‐based attacks.

[1]  Vipin Chaudhary,et al.  Big Data in Finance , 2016 .

[2]  Yi Mu,et al.  Recent advances in security and privacy in large‐scale networks , 2016, Concurr. Comput. Pract. Exp..

[3]  Massoud Masoumi,et al.  Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Kai Yu,et al.  QuantCloud: Big Data Infrastructure for Quantitative Finance on the Cloud , 2018, IEEE Transactions on Big Data.

[5]  Keke Gai,et al.  Privacy-Preserving Adaptive Multi-channel Communications Under Timing Constraints , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).

[6]  Keke Gai,et al.  A Novel Secure Big Data Cyber Incident Analytics Framework for Cloud-Based Cybersecurity Insurance , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[7]  Keke Gai,et al.  Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm , 2015, IEEE Transactions on Computers.

[8]  Chechen Liao,et al.  Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model , 2011, Electron. Commer. Res. Appl..

[9]  Elena Hlaciuc,et al.  Methods for Risk Identification and Assessment in Financial Auditing , 2015 .

[10]  Prabin Kumar Panigrahi,et al.  A Review of Financial Accounting Fraud Detection based on Data Mining Techniques , 2012, ArXiv.

[11]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Hongming Cai,et al.  Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services , 2014, IEEE Transactions on Industrial Informatics.

[13]  Keke Gai,et al.  Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.

[14]  Keke Gai,et al.  Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[15]  Jing Wang,et al.  Cognitive radio in 5G: a perspective on energy-spectral efficiency trade-off , 2014, IEEE Communications Magazine.

[16]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[17]  Xiqi Gao,et al.  Cellular architecture and key technologies for 5G wireless communication networks , 2014, IEEE Communications Magazine.

[18]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[19]  Prem Sikka,et al.  The corrosive effects of neoliberalism on the UK financial crises and auditing practices: A dead-end for reforms , 2015 .

[20]  Kyungwhoon Cheun,et al.  Millimeter-wave beamforming as an enabling technology for 5G cellular communications: theoretical feasibility and prototype results , 2014, IEEE Communications Magazine.

[21]  Peng Shi,et al.  Robust Constrained Control for MIMO Nonlinear Systems Based on Disturbance Observer , 2015, IEEE Transactions on Automatic Control.

[22]  Zhongding Lei,et al.  Coordinated Multipoint Transmission with Limited Backhaul Data Transfer , 2013, IEEE Transactions on Wireless Communications.

[23]  Keke Gai,et al.  Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[24]  Robert W. Heath,et al.  Five disruptive technology directions for 5G , 2013, IEEE Communications Magazine.

[25]  Xuemin Shen,et al.  Enabling device-to-device communications in millimeter-wave 5G cellular networks , 2015, IEEE Communications Magazine.

[26]  Keke Gai,et al.  Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[27]  George Pavlou,et al.  Adaptive Resource Management and Control in Software Defined Networks , 2015, IEEE Transactions on Network and Service Management.

[28]  Kenli Li,et al.  Practical parallel AES algorithms on cloud for massive users and their performance evaluation , 2016, Concurr. Comput. Pract. Exp..

[29]  Kam-Wing Ng,et al.  An overview of using directional antennas in wireless networks , 2013, Int. J. Commun. Syst..

[30]  Keke Gai,et al.  A Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization , 2014 .

[31]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[32]  Zhen Zhang,et al.  Energy Encryption for Wireless Power Transfer , 2015, IEEE Transactions on Power Electronics.

[33]  Keke Gai,et al.  Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G , 2016, Int. J. Commun. Syst..

[34]  Keke Gai,et al.  Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing , 2017, Concurr. Comput. Pract. Exp..

[35]  Jin Liu,et al.  Social sensing enhanced time estimation for bus service , 2015, Concurr. Comput. Pract. Exp..

[36]  Elisa Bertino,et al.  Identity, Privacy, and Deception in Social Networks , 2014 .

[37]  Yannan Li,et al.  Delegation of signing rights for emerging 5G networks , 2016, Concurr. Comput. Pract. Exp..

[38]  C. Alcaraz,et al.  Secure SCADA framework for the protection of energy control systems , 2011, Concurr. Comput. Pract. Exp..

[39]  Keke Gai,et al.  Security and Privacy Issues: A Survey on FinTech , 2016, SmartCom.